Intercom Access Token

ID

intercom_access_token

Severity

low

Vendor

Intercom

Family

API Token

Description

Intercom is a Customer Communications Platform. It shows you who is using your product or website and makes it easy to personally communicate with them with targeted content, behavior-driven messages, and conversational support.

They provide an API to access data in Intercom workspace.

Security

Any hardcoded Intercom Token is a potential secret reported by this detector.

Accidentally checking-in the token to source control repositories could compromise your Intercom account.

Any changes to the app needs to be approved by Intercom. Depending on how a malicious party uses keys, suspicious activities might be caught by Intercom.

Examples

intercom_access_token=dG9rOeWVy8pSEUqKqqhjTudICbrLnGFZWWYbzrYQxjH8B9CHgnecQeXVBt79=

Mitigation / Fix

  1. Remove the Token from the source code or committed configuration file.

  2. Follow your policy for handling leaked secrets, which typically require revoking the secret in the target system(s). API Key revocation can be handled from your Intercom’s workspace in the Developer Hub.

  3. If under a git repository, you may remove unwanted files from the repository history using tools like git filter-repo or BFG Repo-Cleaner. You may follow the procedure listed here for GitHub.

You should consider any sensitive data in commits with secrets as compromised.

Remember that secrets may be removed from history in your projects, but not in other users' cloned or forked repositories.